/Linux-v4.19/drivers/infiniband/hw/mthca/ |
D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
D | mthca_provider.h | 102 int privileged; member
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | sysfs-hypervisor-xen | 22 privileged (e.g. dom0), the hypervisor 25 privileged guests.
|
/Linux-v4.19/tools/perf/arch/x86/util/ |
D | intel-bts.c | 119 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_bts_recording_options() local 153 if (privileged) { in intel_bts_recording_options() 160 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options() 190 if (privileged) { in intel_bts_recording_options()
|
D | intel-pt.c | 558 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_pt_recording_options() local 600 if (privileged) { in intel_pt_recording_options() 607 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 642 if (privileged) { in intel_pt_recording_options()
|
/Linux-v4.19/tools/perf/arch/arm/util/ |
D | cs-etm.c | 72 bool privileged = (geteuid() == 0 || perf_event_paranoid() < 0); in cs_etm_recording_options() local 109 if (privileged) { in cs_etm_recording_options() 117 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options() 162 if (privileged) { in cs_etm_recording_options() 177 if (!privileged && in cs_etm_recording_options()
|
/Linux-v4.19/tools/perf/arch/arm64/util/ |
D | arm-spe.c | 68 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in arm_spe_recording_options() local 92 if (privileged) { in arm_spe_recording_options()
|
/Linux-v4.19/Documentation/filesystems/ |
D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 218 How do non-privileged mounts work? 221 Since the mount() system call is a privileged operation, a helper 224 The implication of providing non-privileged mounts is that the mount 251 for non-privileged mounts. 306 measures, that system processes will never enter non-privileged
|
/Linux-v4.19/Documentation/virtual/kvm/ |
D | ppc-pv.txt | 5 space code in PR=1 which is user space. This way we trap all privileged 8 Unfortunately that is also the downfall. There are quite some privileged 12 This is what the PPC PV interface helps with. It takes privileged instructions 138 also act on the shared page. So calling privileged instructions still works as
|
/Linux-v4.19/Documentation/powerpc/ |
D | dscr.txt | 56 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 59 Accessing DSCR through privileged SPR number (0x11) from user space
|
/Linux-v4.19/Documentation/s390/ |
D | monreader.txt | 28 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 71 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 88 (Class E privileged), see "CP Command and Utility Reference". 161 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
/Linux-v4.19/fs/nfs/ |
D | nfs4session.h | 27 privileged : 1, member
|
/Linux-v4.19/Documentation/acpi/ |
D | aml-debugger.txt | 29 sufficiently privileged user).
|
/Linux-v4.19/arch/mips/kvm/ |
D | Kconfig | 60 When running in Trap & Emulate mode patch privileged
|
/Linux-v4.19/Documentation/sysctl/ |
D | fs.txt | 168 Maximum total number of pages a non-privileged user may allocate for pipes. 177 Maximum total number of pages a non-privileged user may allocate for pipes 272 contents of privileged processes. 279 to treat privileged core dumps with care, or specific directory
|
/Linux-v4.19/Documentation/userspace-api/ |
D | no_new_privs.rst | 42 involve ``execve()``. An appropriately privileged task can still call
|
/Linux-v4.19/Documentation/ |
D | DMA-attributes.txt | 154 accesses to DMA buffers in both privileged "supervisor" and unprivileged 158 lesser-privileged levels).
|
/Linux-v4.19/Documentation/input/ |
D | userio.rst | 19 of them. userio accomplishes this by allowing any privileged userspace program
|
/Linux-v4.19/Documentation/infiniband/ |
D | user_verbs.txt | 68 use by non-privileged processes, it may be useful to add an
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Smack.rst | 422 capabilities is a privileged task, whereas a task with no 606 privileged process can change its own Smack label by writing to 619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 687 can only be set by privileged tasks, but any task can read them for their own 691 The Smack label of the task object. A privileged 696 A privileged program may set this to match the label of another 772 will put the Smack label of the root directory into value. A privileged 786 A privileged process can set the Smack label of outgoing packets with
|
D | Yama.rst | 53 did not transition uids, start privileged, or have called
|
/Linux-v4.19/Documentation/pti/ |
D | pti_intel_mid.txt | 37 Below is example pseudo-code on how a 'privileged' application
|
/Linux-v4.19/Documentation/gpu/ |
D | drm-uapi.rst | 129 is, no modesetting or privileged ioctls can be issued on render nodes. 144 privileged ioctls on render nodes. 148 authenticates clients on the privileged primary/legacy node is no longer
|
/Linux-v4.19/drivers/infiniband/hw/vmw_pvrdma/ |
D | pvrdma.h | 131 int privileged; member
|
/Linux-v4.19/arch/powerpc/kvm/ |
D | Kconfig | 111 privileged instructions and registers.
|